Super Surveillance Technology

A problem with technology that collects ambient data is that it is basically spying on everything all the time. This creates two distinct issues.

1) The first very obvious problem is with privacy. I say this is obvious even though Google just claimed they made a “mistake” collecting all kinds of wireless data around the world with mobile sniffers.

Regulation through policies and procedures is usually proposed as the solution to this first problem. The fact that Google is being threatened with legal action by privacy officials in numerous countries is an example of how this control point can work. Technology also can help with authentication, authorization and live audit trails of who accessed what data and when.

2) The second problem is that too much data will overwhelm analysts, and analysts are expensive. Collecting too much data is not only bad for PR and legal conformance, it also makes a surveillance system impossible to keep up with and make useful. Who has the time or resources to keep up with massive amounts of information and find anomalies quickly? Automation technology is typically proposed as the solution to this problem, but it can also be expensive.

Que the military. They can justify the cost of solving the second problem. The military operates in environments where they collect massive amounts of data unfamiliar to most analysts (training becomes more specialized so costs are far higher) and time to respond is more of the essence. It also helps them that the first problem quickly erodes when dealing with data in a hostile environment.

Take this example provided by BBC News

One technology that BAE Systems trialled, known as a “hyperspectral camera”, is able to analyse colour – to distinguish a camouflaged vehicle from the vegetation it is concealed within.

Gary Bishop from BAE’s Advanced Technology Centre in Bristol told BBC News: “You see things with your eyes in three wavelenths, the hyperspectral camera gives you information in 10.”

The system measures each wavelength of light being reflected by an object – it can see the specific type of green that is produced by chlorophyll in plants, and distinguish that from the green of paint or dye.

Everything in the article centers around systems that create data mining efficiencies.

The military needs to quickly detect unusual patterns within otherwise normal data. This, as mentioned above, is good not only for automation but it also has the secondary effect of helping to protect privacy in civilian surveillance systems.

Automation means humans can be removed from the role of sifting through private and protected information to find a suspicious data point. The surveillance system could be setup to keep everything under wraps and only expose information required to review and confirm. Access only to suspicious event data is far less controversial than access to all data. The more limited access also can be logged and audited later. That means in the end you get access to more data but less privacy risk…assuming you trust and verify the system is operating properly.

This still begs the question of whether it is ethical to collect data in the first place, as in the case with Google. What were they thinking?

“If the company is fighting this so hard, it suggests there is more to this than meets the eye,” said Mr. Davies, of Privacy International. “The real question is: What was Google collecting from unwitting individuals and why? So far, nobody really knows.”

Perhaps at this point they should try to mount a “we were trying to find terrorists” defense…certainly sounds better than “programming error” that ran around the world and for an extended time gathering a massive amount of data.

I have to wonder for a company that has a very public emphasis on hiring the best and brightest whether they really expect anyone to believe that surveillance was not intentional. Most security professionals balk at the idea of capturing packets from random airspace — it’s known to be unethical if not illegal in most contexts. Why Google did not properly account for the risks of surveillance is hard to understand.

Basic Fuzzing Framework (BFF)

A virtual machine can now be downloaded from CERT that is setup to find vulnerabilities in applications using a method known as “dumb fuzzing”. It is based upon the zzuf application.

To begin fuzzing on your own, simply follow these steps:

1. Unzip scripts.zip to c:\fuzz
2. Unzip DebianFuzz.zip to a directory of your choice.
3. Open DebianFuzz.vmx with VMware.
4. Create a snapshot in VMware
5. Power on the VM

You may need to verify that the shared folder is enabled in the VM preferences. Other virtualization products may work with some additional configuration. See the README.txt file in scripts.zip for more details.

Download your very own BFF today and start fuzzing.

Application tests have been required in PCI under requirement six for some time, but nothing like this. I wonder if the availability and ease of fuzzing will be noted in this October’s update to the requirements.

Roll your own cell network (OpenBTS)

I wrote recently about Mobile Device Economics and Security. The OpenBTS project could increase the rapid growth trend of wireless even more dramatically:

OpenBTS is an open-source Unix application that uses the Universal Software Radio Peripheral (USRP) to present a GSM air interface (“Um”) to standard GSM handset and uses the Asterisk software PBX to connect calls. The combination of the ubiquitous GSM air interface with VoIP backhaul could form the basis of a new type of cellular network that could be deployed and operated at substantially lower cost than existing technologies in greenfields in the developing world.

Naturally a question of managed spectrum comes to mind. Yet another explanation of why regulation is good for commerce can be found in an OpenBTS implementation on an unregulated island that ran into trouble finding air space.

Killing IE6

Jeremiah turned me on to this article about the man at Microsoft whose job is to kill IE6.

“Part of my job is to get IE6 share down to zero as soon as possible,” said Ryan Gavin, head of the Internet Explorer business group.

Gavin said Microsoft will continue to work with companies to move legacy applications to more modern versions of Internet Explorer, as well as continuing to highlight the improved security on offer in Internet Explorer 8. For example, a recent campaign run by Microsoft Australia compared using IE6 to drinking milk nine years past its sell-by date.

Supposedly IE6 is the “most used browser version in the world”. I am not sure I buy that statement, especially as it is not sourced. The article claims this is due to being the default browser in XP and also because of developing nations use of old hardware. Bah, it could just as easily be because robots and scripts masquerade as IE6.

Whatever the case, a good solution would be for Microsoft to work with companies like Yahoo! (we are talking legacy here, right?) Facebook and Google to post a warning banner to users of IE6. Something that says “Hello, your browser needs to be upgraded to use this site” could be very effective. Why would a Google or Facebook ever dare to interfere with the user experience? One giant reason is to help turn off things like SSLv2, which actually dates all the way back to the very fist IE4 in 1998.

Late last year I was surprised when Google called me in and asked for my suggestion for what to do about SSLv2. Hard to believe but their engineers still debated how best to support SSLv2 even though it has no advantages and a giant security disadvantage. I gave the same answer as above — post a warning to users with a deadline, give fair notice and link to more information. Start forcing redirects to an upgrade page. No one needs to use SSLv2 and it has been prohibited by regulations for at least three years. No one needs it, and yet it persists. IE6 thus will be an even harder argument, as it might actually be useful, so what chance does Microsoft have to kill it off?

Aside from security flaws there is really no immediate need to mandate users upgrade from IE6. Why would Google to do the right thing and help Microsoft? Their support of an IE6 end of life plan is improbable, but who knows. Google just added SSL to their search page. They already try to warn users of suspicious or dangerous links. Maybe they would also see value in warning users that Microsoft no longer supports IE6 and then offer Chrome as an update.

Incidentally, I must also comment on that milk analogy by Microsoft. It is probably more appropriate than they realized. I would reply that “milk nine years past its sell-by date” is also called cheese. It could in fact be some really GOOD cheese. The big difference, obviously, is that old milk does not require patches and support from the manufacturer (cow?) to remain safe.

So, unless Microsoft can point out the clear (health) risk (they refuse to support their product any longer) consumers will very likely see no harm to aging their milk for many years to come.